General

  • Target

    0a368a95fa17f884181010fa908f8147106f385415d8a42c4ea94627bb32afadN.exe

  • Size

    225KB

  • Sample

    250216-rx7mqszrhz

  • MD5

    28814f92d95c94f49fdf9dea756a3cb0

  • SHA1

    cc772c90b06afb19f8240db4eddc9eb1f3feca53

  • SHA256

    0a368a95fa17f884181010fa908f8147106f385415d8a42c4ea94627bb32afad

  • SHA512

    4d513b998a94a2e0edddbf5f07a1480edd1fcde40ea026359fd9fd3abd6db76346926f276738ab170964bd85e3b7cfa8e39d78950eef055f8f9a9131d45b40d3

  • SSDEEP

    6144:RA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:RATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      0a368a95fa17f884181010fa908f8147106f385415d8a42c4ea94627bb32afadN.exe

    • Size

      225KB

    • MD5

      28814f92d95c94f49fdf9dea756a3cb0

    • SHA1

      cc772c90b06afb19f8240db4eddc9eb1f3feca53

    • SHA256

      0a368a95fa17f884181010fa908f8147106f385415d8a42c4ea94627bb32afad

    • SHA512

      4d513b998a94a2e0edddbf5f07a1480edd1fcde40ea026359fd9fd3abd6db76346926f276738ab170964bd85e3b7cfa8e39d78950eef055f8f9a9131d45b40d3

    • SSDEEP

      6144:RA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:RATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks